KNOWLEDGE DATABASE

Access brief definitions of cyber warfare terminology.
>> Development Phase.

>>

Zero-Day (0day)

VULNERABILITY

A software vulnerability that is unknown to the vendor. The term "zero-day" refers to the fact that the vendor has had zero days to fix the flaw before it is exploited.

RISK: CRITICAL MITRE T1190

Phishing

ATTACK VECTOR

A social engineering attack used to steal user data, including login credentials and credit card numbers, by masquerading as a trusted entity.

RISK: HIGH MITRE T1566

Honeypot

DEFENSE

A decoy system or server deployed alongside production systems within a network. It is designed to entice cyberattackers and detect, deflect, or study hacking attempts.

STATUS: ACTIVE NIST SP 800-83

Ransomware

MALWARE

Malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key.

IMPACT: SEVERE MITRE T1486

Botnet

INFRASTRUCTURE

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, typically used to send spam or launch DDoS attacks.

SCALE: GLOBAL MITRE S0023

Air Gap

HARDWARE

A network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet.

TYPE: PHYSICAL DEFENSE

SQL INJECTION (SQLi)

WEB EXPLOIT

A vulnerability where an attacker interferes with the queries an application makes to its database, allowing access to data that is usually hidden.

RISK: CRITICAL MITRE T1190

DDoS ATTACK

NETWORK

Distributed Denial of Service. An attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.

RISK: HIGH MITRE T1498

MAN-IN-THE-MIDDLE (AiTM)

NETWORK

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

RISK: HIGH MITRE T1557

BRUTE FORCE

CREDENTIALS

A trial-and-error method used to obtain information such as a user password or PIN. Automated software is used to generate a large number of consecutive guesses.

RISK: MEDIUM MITRE T1110

CROSS-SITE SCRIPTING (XSS)

WEB EXPLOIT

A vulnerability that allows an attacker to inject malicious client-side scripts into web pages viewed by other users, often to steal session cookies.

RISK: HIGH MITRE T1059

ROOTKIT

MALWARE

A collection of malicious software designed to enable access to a computer or an area of its software that is not otherwise allowed (usually at the Kernel level).

RISK: CRITICAL MITRE T1014

SOCIAL ENGINEERING

HUMAN INTEL

The psychological manipulation of people into performing actions or divulging confidential information. It relies on human error rather than software bugs.

RISK: HIGH MITRE T1204

MALWARE

THREAT

"Malicious Software." An umbrella term for any code designed to disrupt, damage, or gain unauthorized access to a computer system (e.g., Viruses, Worms).

RISK: VARIES MITRE T1204

FIREWALL

DEFENSE

A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

TYPE: HARDWARE/SOFT MITRE M1037

KEYLOGGER

SPYWARE

Surveillance software (or hardware) that has the capability to record every keystroke you make to a log file, often used to steal passwords.

RISK: HIGH MITRE T1056

VPN (VIRTUAL PRIVATE NETWORK)

DEFENSE

A service that encrypts your internet traffic and masks your online identity by hiding your IP address and routing data through a secure tunnel.

STATUS: ESSENTIAL MITRE M1053

TROJAN HORSE

MALWARE

A type of malware that is disguised as legitimate software. Users are tricked into loading and executing it on their systems.

RISK: HIGH MITRE T1204

ENCRYPTION

CRYPTOGRAPHY

The process of converting information or data into a code (ciphertext), especially to prevent unauthorized access. It is the backbone of modern privacy.

TYPE: ALGORITHM MITRE M1041

HASH FUNCTION

CRYPTOGRAPHY

A mathematical function that converts a numerical input value into another compressed numerical value. The input cannot be retrieved from the hash (One-Way).

USE: INTEGRITY MITRE T1027

SPYWARE

MALWARE

Software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user.

RISK: MEDIUM MITRE T1005

COMPUTER WORM

MALWARE

A standalone malware program that replicates itself to spread to other computers. Unlike a virus, it does not need to attach to an existing file to run.

RISK: CRITICAL MITRE T1571

IDS / IPS

DEFENSE

Intrusion Detection Systems (monitor only) and Intrusion Prevention Systems (monitor and block). They analyze network traffic for signs of known cyberattacks.

TYPE: HARDWARE MITRE M1031

PENETRATION TESTING

PROCESS

(Pen Test). An authorized simulated cyberattack on a computer system, performed to evaluate the security of the system and find vulnerabilities before criminals do.

STATUS: ETHICAL AUDIT

PACKET SNIFFING

SURVEILLANCE

The process of monitoring and capturing all data packets passing through a given network. Tools like Wireshark use this to analyze traffic or steal credentials.

RISK: MEDIUM MITRE T1040

SPOOFING

EVASION

A situation in which a person or program successfully identifies as another by falsifying data (e.g., Caller ID spoofing, IP spoofing) to gain an illegitimate advantage.

RISK: HIGH MITRE T1036

SESSION HIJACKING

WEB EXPLOIT

The exploitation of a valid computer session—sometimes called "Cookie Theft"—to gain unauthorized access to information or services in a computer system.

RISK: CRITICAL MITRE T1563

RED TEAM

OFFENSIVE OPS

A group of security professionals who act as adversaries to an organization's security posture. They simulate real-world attacks to test defenses.

ROLE: ATTACKER SIMULATION

BLUE TEAM

DEFENSIVE OPS

A group of individuals who perform an analysis of information systems to ensure security, identify flaws, and verify the effectiveness of defensive measures.

ROLE: DEFENDER PROTECTION

MULTI-FACTOR AUTH (MFA)

ACCESS CONTROL

A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.

STATUS: MANDATORY MITRE M1032

CSRF

WEB EXPLOIT

Cross-Site Request Forgery. An attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated.

RISK: MEDIUM MITRE T1566

PKI

CRYPTOGRAPHY

Public Key Infrastructure. A set of roles, policies, and hardware needed to create, manage, distribute, and revoke digital certificates and public-key encryption.

STATUS: STANDARD INFRASTRUCTURE

SALT

CRYPTOGRAPHY

Random data added to a password before it is hashed. This prevents attackers from using "Rainbow Tables" (pre-computed hash lists) to crack passwords.

USE: DEFENSE MITRE M1027

DICTIONARY ATTACK

CREDENTIALS

A form of brute force attack that defeats authentication mechanisms by trying hundreds or millions of likely possibilities, such as words in a dictionary.

RISK: MEDIUM MITRE T1110

RAINBOW TABLE

TOOL

A massive precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. It makes cracking faster than pure brute force.

RISK: HIGH MITRE T1110

LOCAL FILE INCLUSION (LFI)

WEB EXPLOIT

A vulnerability where an application allows a user to input a file path (like `../../etc/passwd`), causing the server to display internal files it shouldn't.

RISK: HIGH MITRE T1059

REMOTE FILE INCLUSION (RFI)

WEB EXPLOIT

Similar to LFI, but allows an attacker to load a malicious file from an external server (e.g., `http://evil.com/shell.php`), executing code on the victim.

RISK: CRITICAL MITRE T1190

STEGANOGRAPHY

EVASION

The practice of concealing a file, message, image, or video within another file. For example, hiding malware code inside a harmless `.jpg` image.

RISK: LOW/MED MITRE T1027

DARK WEB

INFRASTRUCTURE

World Wide Web content that exists on darknets (overlay networks) that use the public Internet but require specific software (like Tor) and authorization to access.

RISK: VARIES ANONYMITY

TOR

TOOL

The Onion Router. Free software for enabling anonymous communication. It directs traffic through a worldwide, volunteer overlay network to conceal location.

USE: PRIVACY MITRE T1090